Business Description
The ICT has been developing in the business organization in the current years. The XYZ organization is a small programming based organization built up five years prior in Melbourne. It used to create and redo applications in the data and systems administration field. The organization is looking for growing its business in various parts of the nation. It is accepted that the organization has a decent client base in the market yet at the same time not utilizing the distributed computing administrations in their business. It is expected that the organization be not moved up to the most recent advancements accessible in the market. There are different internet issues incorporating the digital assaults with the assistance of infections, malwares and ransom ware. This have been a major issue for the organization to secure their information and data from these assaults.
Objective and methodology
This report refers to the IT sector market for the advancement of the organization in the market. Different types of advancements and updates in the industries have been talked about in report. This report concentrates on the Information security over the internet. The reason for the report is to recognize the dangers engaged with the online information and data of the organization. This report concentrates on the techniques utilized for alleviating the digital issues in the organization. This report manages the moral and social issues of the organization in the market. There are moral issues in the official administration group taking part in the life cycle of the business organization.
Report Outline
This report outlines the philosophy to be used for the advancement of the organization in the market. This report portrays the procedures to be utilized to moderate the moral and social issues of the organization in the market. This report give a few proposals that aide in settling the difficulties confronted by the organization in the market. The report concentrates on the security and their mechanical parts of the security to distinguish fitting answers for defeat the dangers included.
Defining Network Security
The policies and procedures implemented to protect network from unauthorized access, modification, denial of access is termed as network security (Scott-Hayward, O’Callaghan & Sezer, 2013). The security provided to the systems connected in the network from the malicious behavior of the intruders has been an important topic in the market. It is the commitment of system directors to grasp preventive measures to shield their system from potential security risks.
PC composes that are locked in with standard trades and correspondence inside the organization, individuals, or business require security. The most broadly perceived and essential strategy for guaranteeing a system resource is by designating it an exceptional name and a relating mystery word (De Marco et al., 2017). The business organization have been working over the internet to build their business in the market. Hence, the security of the information and data over the internet is a vital part for the business association. The objectives and targets of the business association must be satisfied with the assistance of security of data.
Types of security application
Different system security applications are at present utilized as a part of the market by the business association including Antiviruses, Firewalls and Intrusion Detection Systems. The use of the appropriated registering helps in securing basic data and information over the internet. The use of an updated antivirus and firewalls keep the foundation of some basic programming and application in the structure. These security applications help in controlling the digital assaults in the business association. For instance, Norton Security is an antivirus programming that shield information and data from the being broken (Fernandes et al., 2014). This application gives Anti-Spam, Email Attachment Protection, Spyware Removal, Anti-Virus,and Internet Threat Management to the clients (Modi et al., 2013). These highlights help in giving a secured domain to the data over the internet. It helps in distinguishing destructive infections and malwares over the internet.
Firewalls
The firewalls helps in monitoring and blocking various unusual HTTP traffic in the server of the XYZ Company. It also helps in clarifying the congestion in the network due to the unusual data packets in the channel. The monitoring of application over the internet helps in maintaining the security of the network in the server. The firewalls also helps in preventing the cyber-attacks in the network by restricting harmful viruses and malwares from entering into the network of the server. As commented by Komninos, Philippou & Pitsillides, (2014), intrusion detection system helps in monitoring various malicious activities and help in stopping them. The intrusion detection system acknowledges with alarm against malicious activities in the network server.
Various factors are responsible for the implementation of the solution to the prevention of data and information in the business organization. A properly updated antivirus and firewall limits the entry of the viruses and malwares in the server of network.
Updating system
The applications and software utilized as a part of the PC and system requires being updated. These aides in confining the unapproved activities in the PC and system (Jing et al., 2014). The inventory of the applications and information must be updated for permitting establishment of legitimate fixes and updates.
Strong passwords
The important credentials and passwords of the XYZ Company have to be kept in safe place that helps in securing it. The security level of the passwords have to be high by using the combination of numbers, alphabets and symbols (Fang, Han & Li, 2014). This helps in increasing the difficulty of the password to crack. Therefore, the security of the data and information of the XYZ Company can be maintained.
Securing VPN
Personality verification and Information encryption are the important elements of the VPN. An open system organization is a major weakness for the hackers can easily breach into the system. The data and information of the company is open to all over the internet that causes huge loss of the company in the market (Singhal et al., 2013). The use of the VPN helps in maintaining the security of the IP address of the system and the network. Frameworks of the VPN helps in hiding the IP address of the system for the intruder over the internet. This helps in providing extra security to the data and information of the system.
The multi-factor validation of the accounts over the internet helps in securing the data and information of the company. The more strides your customers must take to exhibit their identity, the better. For example, despite a mystery word, customers could be required to enter a PIN (Liang & Yu, 2015). Then again, an unpredictable numerical code created by a key authenticator predictably could be used as a piece of conjunction with a PIN or mystery word. The usage of the VPN in the framework gives extra security to the framework.
Backing up Data
The information and data are backed up for recuperation. The system back up and debacle recuperation helps in keeping up the reinforcement information and data (Granjal, Monteiro & Silva, 2015). Due to information misfortune of any digital assault and information rupture, the lost information can be recouped effortlessly.
For this situation, the XYZ Company is looking for development in the market. Along these lines, the information and data with respect to business must be secured. The utilization of these applications may help in dealing with the security and insurance of the information and data in the association (Liang & Xiao, 2013). These elements help in building up the association in the market. The correct administration of critical information and fundamental is vital for the accomplishment of the organization in the market. The development of the organization depends in the security of the information and data in the market. The security of the points of interest of workers and clients is essential to be kept up by the organization for some time later (Chen et al., 2016). This helps in upgrading the nature of the services gave to the clients. This software organization is at present working in an off the-shelf application.
In the current situation, the company has been operating in limited regions of Australia. Therefore, the company is looking for the expansion of the business. The implementation of the off-shelf application might help in connecting different customers with the company in the market (Sgora, Vergados & Chatzimisios, 2016). This also helps in enhancing the expansion of the company in the market. The implementation of the online business of the XYZ Company helps in attracting a huge number of customers in the market. Online business helps in rapid expansion of the business in the market. It also helps in creating a huge customer base in the market by gaining the trust of the customer by its services.
There are different favorable circumstances and hindrances of the solutions of the system security. The utilization of the firewalls and antivirus helps in securing the information and data of the organization (Faruki et al, 2015). The utilization of the distributed computing in the management of the organization helps in securing the information and data over the cloud. The utilization of the distributed computing helps in putting away imperative information and data over the internet (August, Niculescu & Shin, 2014). An updated antivirus and firewall helps in confining the viruses and malwares from going into the system of the organization. It likewise helps in identifying the malwares and viruses and expel from the system of the organization. The utilization of the VPN in the system gives additional security to the system. The utilization of the VPN helps sequestered from everything the IP address of the frameworks associated in the system (Deligiannidis et al., 2013). Then again, there are a few disservices of these arrangements in the system. The utilization of a updated antivirus and firewalls limit the establishment of some imperative programming and application in the framework. This may make misfortune the organization in regards to the utilization of the application in the framework. The utilization of firewall limits a few information bundles from entering the system that are valuable for the organization in the market (Sezer et al., 2013). The innovative parts of the system security have been winning in the organization those aides in keeping up the security of the information and data.
Different issues and risks are recognized in the XYZ Company regarding the network security in the market. These risks are discussed are discussed below:
USB and external devices
The external USB devices are prone to cyber-attacks from the hackers. The harmful malwares and viruses enters into the system causing damage to the data and information. As commented by Acemoglu, Malekian & Ozdaglar, (2016), the use of the external devices and media in the mobile computing causes various cyber-attacks in the system.
Insufficient policies
The utilization of messages and other internet offices in the association by the workers must be instructed with the right utilization of the framework. These aides in keeping up the security of the frameworks from being assaulted. The hazard is engaged with the moral status of the organization in regards to the security of the system over internet (Yang et al., 2015). There are different social issues of utilizing the system security with respect to the utilization of the social sites. These sites are inclined to the assault of the infection and malwares over internet.
Cloud Attacks
The organization utilizing the cloud computing services that can cause digital assaults in the organization. The network security of the organization has been an earlier issue in the market. The use of the laptop and mobile workstations in the giving cloud services causes security rupture in the system. The security convention introduced in the cell phones are not solid to limit the viruses and malwares.
The moral, social and legitimate issues are prevailing in the organization. The utilization of the lawful laws and approaches have enhanced the circumstance in the organization identified with the system security. The Federal Privacy Act 1988 have helped in securing the information and data of the organizations in the market (Sezer et al., 2013). The private division organizations have been profited by the establishment of this law in the market. Under this demonstration, individual data identified with a particular client or worker of the organization are secured appropriately. Different acts are identified with the cybercrime and system security including Privacy and Data Protection Act 2014, Personal Information Protection Act 1998, Privacy and Information Privacy Act 2009, Personal Information Protection Act 2004, Information Privacy Act 2014 and Information Act 2002. The best possible usage of these demonstrations and strategies helps in reinforcing the security conventions of the organization (Modi et al., 2013).
Conclusion
It can be concluded that the security of the information and data in the XYZ Company is a basic piece of their operational management framework. The information and data of the organization is put away and exchanged on the internet. Along these lines, there is a huge danger of information rupture amid exchanging information. This IT Company is searching for development in the market. There are different arrangements gave in the report that aides in keeping up dangers and issues in the organization. There are different issues talked about in the report identified with the system security in the organization. These risks and issues in the security of the information and data has been said in the report. The different laws and acts have helped in keeping up the noxious exercises over the internet. There are appropriate suggestions gave toward the finish of the answer to investigations the solution for arrange security issues.
Encryption
The company have to use the encryption technique in their management. The encryption of data and information helps in securing data by locking system the data packets are locked with the help of a key that is only known to transmitter and receiver. This helps in providing utmost security to the data packets.
Use of strong passwords
The applications of the organization need to utilize a solid secret key that aides in limiting the odds of the hacking of the system. The server of the organization need to utilize strong password that cripples the section of the malignant clients in the system. The password must be no less than eight characters in length. The mix of capital and little letters, numbers and unique characters are useful in making solid passwords for the system servers. The organization needs to change the passwords routinely. These reductions the odds of coordinating the passwords by the hackers.
Layered Security architecture
The XYZ Company have to implement a layered architecture in the organizational stricture that helps in maintaining the security of information and data. The layered architecture provide different layers of security that helps in restricting the hackers to enter into the system of the company over the internet.
Using a secured back up plan
The backup design is a secured procedure for any IT framework. There can be any sort of information and data loss in the organization that can make huge loss for the organization in the market along these lines, the utilization of the backup helps in recuperating the lost information. The backup information and data is put away in a secured and remote place far from the customary place of business. These aides in shielding information from both physical and cyber-attacks.
The organization may search for the utilization of the robotics science in the organization. The utilization of the robotics helps in limiting the workload on the representatives of the organization. The headway in the innovative part of the organization may drove the organization towards the success and growth in the market.
References
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion. Journal of Economic Theory, 166, 536-585. DOI: 10.1016/j.jet.2016.09.009
August, T., Niculescu, M. F., & Shin, H. (2014). Cloud implications on software network structure and security risks. Information Systems Research, 25(3), 489-510. DOI: 10.1287/isre.2014.0527
Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-defined mobile networks security. Mobile Networks and Applications, 21(5), 729-743. DOI: 10.1007/s11036-015-0665-5
Deligiannidis, L., Wiseman, C., Yun, M., & Arabnia, H. R. (2013). Security Projects for Systems and Networking Professionals. Emerging Trends in ICT Security, 111. DOI:10.1016/B978-0-12-411474-6.00007-4.
De Marco, A., Mangano, G., Zenezini, G., Cagliano, A. C., Perboli, G., Rosano, M., & Musso, S. (2017, July). Business Modeling of a City Logistics ICT Platform. In Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual (Vol. 2, pp. 783-789). IEEE. DOI: 10.1109/COMPSAC.2017.76
Fang, Z., Han, W., & Li, Y. (2014). Permission based Android security: Issues and countermeasures. computers & security, 43, 205-218. DOI: 10.1016/j.cose.2014.02.007
Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M., & Rajarajan, M. (2015). Android security: a survey of issues, malware penetration, and defenses. IEEE communications surveys & tutorials, 17(2), 998-1022. DOI: 10.1109/COMST.2014.2386139
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), 113-170. DOI 10.1007/s10207-013-0208-7
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312. DOI: 10.1109/COMST.2015.2388550
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501. DOI 10.1007/s11276-014-0761-7
Komninos, N., Philippou, E., & Pitsillides, A. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16(4), 1933-1954. DOI: 10.1109/COMST.2014.2320093
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys & Tutorials, 15(1), 472-486. DOI: 10.1109/SURV.2012.062612.00056
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. DOI: 10.1007/s11227-012-0831-5
Scott-Hayward, S., O’Callaghan, G., & Sezer, S. (2013, November). SDN security: A survey. In Future Networks and Services (SDN4FNS), 2013 IEEE SDN For (pp. 1-7). IEEE.
Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., … & Rao, N. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), 36-43. DOI: 10.1109/MCOM.2013.6553676
Sgora, A., Vergados, D. D., & Chatzimisios, P. (2016). A survey on security and privacy issues in wireless mesh networks. Security and Communication Networks, 9(13), 1877-1889. DOI: 10.1002/sec.846
Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G. J., & Bertino, E. (2013). Collaboration in multicloud computing environments: Framework and security issues. Computer, 46(2), 76-84. DOI: 10.1109/MC.2013.46
Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1-10. DOI: 10.1016/j.jnca.2015.02.001
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20-27. DOI: 10.1109/MCOM.2015.7081071
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download